<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS authentication over the VPN tunnel - How To? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012508#M390806</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.  I hadn't had a chance to test this yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Sep 2008 12:34:58 GMT</pubDate>
    <dc:creator>jeff_groesbeck</dc:creator>
    <dc:date>2008-09-08T12:34:58Z</dc:date>
    <item>
      <title>TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012495#M390793</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;There are multiple examples on how to setup TACACS autentication/authorization on the PIXs, but they all seem to use local ACS (on the inside interface of the PIX). What if we have ACS on a remote site and have to send AAA requests across the VPN tunnel? Is this supported by Cisco? Should I still use: "aaa-server TACACS (inside)..." or is it considered to be on an outside interface? Any examples out there? Same question for the ASA appliance (8.0(3)).&lt;/P&gt;&lt;P&gt;THank you,&lt;/P&gt;&lt;P&gt;Evgueni&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012495#M390793</guid>
      <dc:creator>evguenipesliak</dc:creator>
      <dc:date>2019-03-10T22:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012496#M390794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Authentication determines who the user is and authorization determines what the user can do. Before you configure the security appliance to use an external server, you must configure the server with the correct security appliance authorization attributes and, from a subset of these attributes, assign specific permissions to individual users. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer the following urls for the configuration guide and example on authentication/authorization configs:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa81/config/guide/extsvr.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa81/config/guide/extsvr.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more info on "aaa srever TACACS" COMMAND refer:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/ab.html#wp1070086" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/pix/pix63/command/reference/ab.html#wp1070086&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 15:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012496#M390794</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2008-05-14T15:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012497#M390795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply, Smahbub&lt;/P&gt;&lt;P&gt;However the question was about one particular scenario, when the ACS server (TACACS+) is on the opposite side of the VPN tunnel. How do I configure the ASA in that case? Is it supported by Cisco? I do not want to send AAA traffic over Internet, but via the VPN... Do I use (inside) or (outside) command in that case?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Evgueni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 May 2008 15:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012497#M390795</guid>
      <dc:creator>evguenipesliak</dc:creator>
      <dc:date>2008-05-16T15:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012498#M390796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think this can be done, I have been trying to accomplish the same thing on both 7.x ASA code and 8.x ASA code.  I have opened a TAC and was told this isnt possible.  I have also asked the question to our Cisco Advanced Services Team and other that I know that work for Cisco, including 2 CCIE route/switch and a CCIE security.  I also want to send dhcp requests back across the VPN tunnel and this is also not possible.  I have to run the dhcp server on the ASA, which makes it more difficult to administer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 May 2008 00:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012498#M390796</guid>
      <dc:creator>mike.keller</dc:creator>
      <dc:date>2008-05-17T00:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012499#M390797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have confirmed that this is a bug in the 8.x code train.  It was suggested to me to use 7.2(4) code, which I will be installing and testing tomorrow.  If it works, I will post the proper syntax to source the AAA from the inside interface across the VPN tunnel.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 00:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012499#M390797</guid>
      <dc:creator>mike.keller</dc:creator>
      <dc:date>2008-05-20T00:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012500#M390798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much, Mike&lt;/P&gt;&lt;P&gt;Would appreciate greatly if you could share your findings with us.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 May 2008 12:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012500#M390798</guid>
      <dc:creator>evguenipesliak</dc:creator>
      <dc:date>2008-05-20T12:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012501#M390799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;        i'm currently encountering this exact same issue. I'm running 8.0(3) code, and can't get the remote end to talk to out ACS Server, even though a ping sourced from the inside interface works. Seems silly this setup is possible between an ASA and a router but not an ASA to ASA setup. I'm intrigued to know your findings.&lt;/P&gt;&lt;P&gt;      i'm waiting with bated breath &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2008 10:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012501#M390799</guid>
      <dc:creator>alibowluk</dc:creator>
      <dc:date>2008-05-29T10:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012502#M390800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you ever get this working?  I am encountering exactly the same issue with 8.0(3) code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our 7.2 ASA's work fine with exactly the same config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a bug reference for this issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 09:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012502#M390800</guid>
      <dc:creator>richardburford</dc:creator>
      <dc:date>2008-06-11T09:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012503#M390801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello.  I'd be curious to know if anyone has tried this with 8.0(4) and if it is fixed.  I am having this problem as well and have used RADIUS as a workaround in the meantime.  I can't perform command authorization this way, but I do get authentication and it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Sep 2008 18:57:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012503#M390801</guid>
      <dc:creator>jeff_groesbeck</dc:creator>
      <dc:date>2008-09-04T18:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012504#M390802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share your RADIUS setup? Which interface you use - inside or outside? Surprised to hear that it works for RADIUS - thought it does not work for both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Evgueni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Sep 2008 19:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012504#M390802</guid>
      <dc:creator>evguenipesliak</dc:creator>
      <dc:date>2008-09-04T19:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012505#M390803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Evgueni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration I'm using is on an ASA with 8.0(3) code.  Basically, the AAA setup is the same as it always is (of course, RADIUS in this case because TACACS doesn't work) and I am using the 'inside' interface as the source interface.  I am also using the management-access inside command to make sure that it will communicate using the inside address over the tunnel.  I'm pretty sure this command has to be there for this to work (at least I think it used to be).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have this working on an ASA right now and it works fine.  Authentication only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Sep 2008 19:12:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012505#M390803</guid>
      <dc:creator>jeff_groesbeck</dc:creator>
      <dc:date>2008-09-04T19:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012506#M390804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I opened a case on this issue to see if it was resolved in 8.0(4).  This issue regarding TACACS over a VPN tunnel has a bug ID (CSCsk08454) and is resolved in 8.0(4).  I have not tested this yet, but it is in the release notes as well.  I also looked the bug up and found a workaround as well.  I have not tried this either, but it is listed in the bug tracker.  Apparently if you enable reverse route injection for the L2L tunnel, tacacs will work successfully.  Again, I haven't tested this, but it's in the notes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Jeff&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 16:15:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012506#M390804</guid>
      <dc:creator>jeff_groesbeck</dc:creator>
      <dc:date>2008-09-05T16:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012507#M390805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this exact problem with 8.0(3).  I upgraded to 8.0(4) reloaded and logged straight in using TACACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.0(4) should completely resolve this issue for you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 07:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012507#M390805</guid>
      <dc:creator>richardburford</dc:creator>
      <dc:date>2008-09-08T07:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012508#M390806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.  I hadn't had a chance to test this yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 12:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012508#M390806</guid>
      <dc:creator>jeff_groesbeck</dc:creator>
      <dc:date>2008-09-08T12:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012509#M390807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This has been resolved with 8.0(4).  In order to use it here is the syntax:&lt;/P&gt;&lt;P&gt;aaa-server SOMENAMEHERE protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server SOMENAMEHERE (INTERFACE) host x.x.x.x key xxxxxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have personally verified that this works on 8.0(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 18:00:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012509#M390807</guid>
      <dc:creator>mike.keller</dc:creator>
      <dc:date>2008-11-13T18:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012510#M390808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a ASA 5510 running 8.2(4) code.&amp;nbsp; I have a site-to-site VPN of which this ASA is the remote end.&amp;nbsp; I'm trying to tunnel NTP, and Authentication traffic through the VPN tunnel but SSH in the the clear so both traffic types terminate and originate from the outside interfaces.&amp;nbsp; The authentication method is TACACS at the moment and I've specified the outside interface for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I can't seem to get this working; any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2011 19:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012510#M390808</guid>
      <dc:creator>grimish.patel</dc:creator>
      <dc:date>2011-01-18T19:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012511#M390809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update - got this working, by simply upgrading to v8.2(5).&amp;nbsp; One thing left.&amp;nbsp; How do I authenticate from a standby ASA acrossing the active VPN (I can't see how this is done, unless somehow the inside interfaces are used)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Sep 2012 15:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/1012511#M390809</guid>
      <dc:creator>grimish.patel</dc:creator>
      <dc:date>2012-09-29T15:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS authentication over the VPN tunnel - How To?</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/3811030#M390810</link>
      <description>&lt;P&gt;Mike,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know this is a very old forum but I am having this same issue.&amp;nbsp; However, I was able to get DHCP to work across the tunnel so local clients can pull DHCP across the tunnel.&amp;nbsp; This only worked when I created an SVI for the VLAN in question and added the 'ip helper-address' command.&amp;nbsp; I also had to make sure I was using a more specific network object instead of an all subnets object (0.0.0.0/0) for NAT exemption and the ACL for tunnel traffic.&amp;nbsp; Once this was done, I was able to pull DHCP from the main DC.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 16:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authentication-over-the-vpn-tunnel-how-to/m-p/3811030#M390810</guid>
      <dc:creator>Terence Lockette</dc:creator>
      <dc:date>2019-02-27T16:15:41Z</dc:date>
    </item>
  </channel>
</rss>

